GUI tool to create ROP chains using the ropper API
☆159Mar 30, 2018Updated 7 years ago
Alternatives and similar repositories for ropa
Users that are interested in ropa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- extending IDA's string navigation capabilities☆174Oct 25, 2020Updated 5 years ago
- A tool to help you write binary exploits☆609Feb 21, 2019Updated 7 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- A Javascript library for browser exploitation☆896Feb 12, 2019Updated 7 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆940Nov 15, 2021Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ☆628Jan 20, 2023Updated 3 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- ☆37Jun 7, 2019Updated 6 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Sep 27, 2017Updated 8 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆132Nov 27, 2019Updated 6 years ago
- Decompiler for x86 and x86-64 ELF binaries☆220Apr 16, 2019Updated 6 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆769Jul 25, 2022Updated 3 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,853Feb 25, 2025Updated last year
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Tutorial for writing kernel exploits☆255Aug 10, 2025Updated 7 months ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago